(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Efficient Message Dispatching in Distributed Environments

Publishing Venue

IBM

Related People

West, AM: AUTHOR

Abstract

When implementing object-oriented messages in a distributed system the normal method is to use a proxy or surrogate object which is using the remote object. The proxy object is a shadow of the real object which forwards the message to the real object elsewhere in the system. The drawbacks of using proxy objects is that they impose unnecessary knowledge requirements on the user of the remote object, having to populate client systems with these proxy objects, and they also interpose an unnecessary level of indirection and complication between the user of the objects.

Country

United States

Language

English (United States)

This text was extracted from an ASCII text file.

This is the abbreviated version, containing approximately
52% of the total text.

Efficient Message Dispatching in Distributed Environments

When
implementing object-oriented messages in a
distributed system the normal method is to use a proxy or surrogate
object which is using the remote object.
The proxy object is a
shadow of the real object which forwards the message to the real
object elsewhere in the system. The
drawbacks of using proxy objects
is that they impose unnecessary knowledge requirements on the user of
the remote object, having to populate client systems with these proxy
objects, and they also interpose an unnecessary level of indirection
and complication between the user of the objects.

A solution to
the above problems is to provide a special
addressing scheme for objects. The
scheme caters for three kinds of
objects 1) objects based on the native operating environment
messaging system, 2) local objects as defined in PMPLUS [*], and 3)
remote objects. Remote objects are ones
on a different system and
potentially running in a different environment, to one on which the
message send is executed. The scheme is
potentially implementable on
a variety of hardware and operating system environments (IBM Products
AIX*; 370: MVS, VM, AIX on RISC System/6000* and RT*; X86: Windows,
OS/2*.) It removes the need for proxy
objects on all machines which
require to use them. Also a name
resolution protocol is employed to
locate classes on a network.

The scheme
uses the least significant bits of an object handle
as flags, as follows:
00 Native system object
01 Local object
10 Remote object

The message
send function would then process a send request as
follows:
1. Isolate the two low-order bits.
2. Shift left two bits (multiply by
four).
3. Go via branch table to appropriate
handler.

When the object is a system or local object
the processing
would be...